Ransomware

Petya Ransomware | How It Spreads and How to Stay Ahead

After an examination of the encryption routine of the malware utilized as a part of the Petya/ExPetr assaults, experts understand that the malware author can’t…

web security

Comodo One. Comodo Remote Control – Faster and Easier Remote Desktop Connections for MSPs

One of the priorities of the Comodo One (C1) project is to put an end to the fragmented software model for MSPs. We intend to…

Making Sense of Needs vs. Cyber Vendor Claims: Analyst Meets Expert

With malware ransoms now rising to¬†as high as $1M (USD), there is heightened urgency for organizations and their CISOs, CSOs and other leaders to understand…

Endpoint Protection

Best 10 Features of an Effective Endpoint Security Strategy

With overwhelming cyber attacks happening through malicious apps on mobile devices, security geeks are to intensify the endpoint security measures multiple folds. Setting up stringent…

Fathers Day

Try Something Unique This Father’s Day

Why should fathers day be about you alone? It could well be about your children, right? After all, they are your flesh and blood and…

Google Proposes: Managed CAs to Issue Symantec Certificates

Google Proposes: Managed CAs to Issue Symantec Certificates

On May 19, 2017, in the Blink Process forum, Ryan Sleevi of the Google Chrome team wrote:”Chrome will require that by 2017-08-08 all new Symantec-chaining…

Antivirus

Ransomware Defense: How to avoid falling victim to the next “WannaCry” [Webinar]

Join NATO Cyber Centre Ambassador Kenneth Geers and Comodo cybersecurity expert Gregory Lewis on June 7 for a free webinar to learn how you can…